All versions prior to V5.09.02.02T4 of the ZTE ZXIPTV-EPG product use the Java RMI service in which the servers use the Apache Commons Collections (ACC) library that may result in Java deserialization vulnerabilities. An unauthenticated remote attacker can exploit the vulnerabilities by sending a crafted RMI request to execute arbitrary code on the target host.
References
Link | Resource |
---|---|
http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1008682 | Vendor Advisory |
http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1008682 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 03:06
Type | Values Removed | Values Added |
---|---|---|
References | () http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1008682 - Vendor Advisory |
Information
Published : 2018-07-25 15:29
Updated : 2024-11-21 03:06
NVD link : CVE-2017-10934
Mitre link : CVE-2017-10934
CVE.ORG link : CVE-2017-10934
JSON object : View
Products Affected
zte
- zxiptv-epg_firmware
- zxiptv-epg
CWE
CWE-502
Deserialization of Untrusted Data